Lucene search

K
archlinuxArch LinuxASA-201602-16
HistoryFeb 21, 2016 - 12:00 a.m.

thunderbird: multiple issues

2016-02-2100:00:00
Arch Linux
lists.archlinux.org
37

0.039 Low

EPSS

Percentile

92.0%

  • CVE-2015-7575 (man-in-the-middle):

Security researcher Karthikeyan Bhargavan reported an issue in Network
Security Services (NSS) where MD5 signatures in the server signature
within the TLS 1.2 ServerKeyExchange message are still accepted. This is
an issue since NSS has officially disallowed the accepting MD5 as a hash
algorithm in signatures since 2011. This issues exposes NSS based
clients such as Firefox to theoretical collision-based forgery attacks.
This issue was fixed in NSS version 3.20.2.

  • CVE-2016-1523 (remote code execution):

Security researcher Holger Fuhrmannek reported that a malicious Graphite
"smart font" could circumvent the validation of internal instruction
parameters in the Graphite 2 library using special CNTXT_ITEM
instructions. This could result in arbitrary code execution.

In general this flaw cannot be exploited through email in the
Thunderbird product, but is potentially a risk in browser or
browser-like contexts.

  • CVE-2016-1930 (remote code execution):

Bob Clary, Christian Holler, Nils Ohlmeier, Gary Kwong, Jesse Ruderman,
Carsten Book, and Randell Jesup reported memory safety problems and crashes.

In general these flaws cannot be exploited through email in the
Thunderbird product because scripting is disabled, but are potentially a
risk in browser or browser-like contexts.

  • CVE-2016-1931 (remote code execution):

Bob Clary, Carsten Book, Christian Holler, Nicolas Pierron, Eric
Rescorla, Tyson Smith, Gabor Krizsanits, and Randell Jesup reported
memory safety problems and crashes.

In general these flaws cannot be exploited through email in the
Thunderbird product because scripting is disabled, but are potentially a
risk in browser or browser-like contexts.

  • CVE-2016-1935 (remote code execution):

Security researcher Aki Helin used the Address Sanitizer tool to find a
buffer overflow write when rendering some WebGL content. This leads to a
potentially exploitable crash.

In general this flaw cannot be exploited through email in the
Thunderbird product, but is potentially a risk in browser or
browser-like contexts.

OSVersionArchitecturePackageVersionFilename
anyanyanythunderbird< 38.6.0-1UNKNOWN